Content Posted in 2025
Acting Quickly: Determining Urgency in Phishing Messages, Patrick Rau
Addressing Physical Space Needs of Neurodivergent Students, Mary Francis
A Deep Learning Approach to Vulnerability Detection in Lifted Code Using Transformer-Based Embeddings, Gary McCully
Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines, Jayaprakashreddy Cheenepalli, John Hastings, Khandaker Mamun Ahmed, and Chad Fenner
AI Super Resolution for Structural Damage Detection From Low Quality Sources, Catherine Hoier and Khandaker Mamun Ahmed
A Mixed Methods Comparative Analysis of Organizational Incident Response to SolarWinds and Log4Shell, Matthew Ryan
Analyzing American Voters’ Positive and Negative Responses to AI-Generated Political Advertisements, Grace Schofield
Analyzing the Effectiveness of Information Security Compliance on Cloud Based Small and Medium Enterprises (SMEs), Kasie Kelvin Awagu
An Exploration of Machine Learning Security, Carson Kendall Grandi Koball
Aphanomyces root rot of alfalfa disease survey in Eastern South Dakota establishes widespread pathogen distribution, Jennifer M. Giles, Conner L. Tordsen, and Andrew E. Sathoff
A Risk Evaluation Framework and Comprehensive Security Compliance Assessment Solution for Space Information Networks (SIN), Bernard Afaare Dawaare
Assessing Commercial Biological Control Agents for Activity Against Alfalfa Root Rotting Pathogens, Travis R. Rebstock, Conner L. Tordsen, Brandon Daniels, Oleksandra Rachynska, and Andrew E. Sathoff
Assessing Commercial Biological Control Agents for Activity Against South Dakota Alfalfa Pathogens, Conner L. Tordsen and Andrew E. Sathoff
Assessing Security Flaws in Modern On-Board Precision Farming Systems, Joseph Boyd
A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals, Sunil Arora and John D. Hastings
A Survey of Unikernel Security: Insights and Trends from a Quantitative Analysis, Alex Wollman and John Hastings
A Teacher Apprenticeship Pathway in a Rural, Midwest State: Perspectives of Teacher Apprentices, Megan Schuh, Jennifer Nash, David DeJong, and Ryan Young
A Teacher Apprenticeship Pathway in a Rural, Midwest State: Perspectives of Teacher Apprentices, Megan Schuh, Jennifer Nash, Ryan Young, and David De Jong
Automatic Heap Primitive Detection for Exploit Development, Rachel Glockenmeier
Automating Mobile Malware Evasion: An Opcode N-Gram Based Approach to Generate Machine Learning Powered Adversarial Examples, Kenji Harada
Automobile Autonomy vs the Social Impact of Human Trust, Robert J. Goscicki II
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code, Gary McCully, John Hastings, Shengjie Xu, and Adam Fortier
Bones et. al: Educational Human Skeletons Restoration and Investigation, Emelye Josko and Andrew E. Sathoff
Bone Surface Modification Dataset Synthesis for Computer Vision Models Using LoRA Tuned Latent Diffusion Models, Jason Mixon
Bridging Cognitive Psychology and Natural Language Processing: A Bias-Detection Framework for Large Language Models, Stephen Surles
CEKER: A Generalizable LLM Framework for Literature Analysis with a Case Study in Unikernel Security, Alex Wollman and John Hastings
CGFuzzerArt: A Directed Graybox Fuzzer for Vulnerability Discovery, Zishan Merza
China’s Rise in the Global AI Sector, Olivia Armstrong
China vs Democracy: The Strategic Use of Cyber Influence Campaigns, Alexander Deak
China vs Democracy: The Strategic Use of Malign Cyber Influence Campaigns, Alexander Deak
Comparative Analysis of Forensic Tool Testing Frameworks to Use With Mobile Forensic Tools, Gillian Morris
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code, Gary McCully, John Hastings, Shengjie Xu, and Adam Fortier
Confronting the Reproducibility Crisis: A Case Study of Challenges in Cybersecurity AI, Richard H. Moulton, Gary A. McCully, and John D. Hastings
Convolutional Autoencoder Neural Network Design Evaluation for an Anomaly Detection Subsystem in Autonomous Spacecraft Computer Vision Systems, Jonathan F. Lancelot
Differential Privacy for Microdata Streams: Adversarial Approaches, Sean McElroy
Does the Use of Audits Decrease the Infection Rate in a Medical Care Setting?, Kylie Borchert and Kristel K. Bakker
Do Online Proctoring Software Abide by Standard Data Protections?, Tristan Stapert
Employee and Employer Perceptions Regarding Cybersecurity Education During The Hiring Process, Jordan VanHoy
Enhancing Crop Yield through Efficient Anomaly Detection Using Transfer Learning and Multispectral Satellite Imagery, Muhammad Bhutta, Khandaker Mamun Ahmed, Abid Mehmood, Youssef Harrath, and Jihene Kaabi Dr.
Ethanol Concentration in Gasoline, Hannah Feser, Wyatt Olson, and Jeffrey Elbert
Evaluating SMS Spam Classification: Human Judgement vs Machine Learning Models, Gabe Miller
Experiential Learning Through Simulations in Fully Online Asynchronous Courses: Exploring the role of self-debriefing, David De Jong and Sara Dexter
Exploring an AI Chatbot to Close School Counselor Information Gaps: A Design Science Approach, Kalee Crandall
Factors Influencing Blockchain Implementation in Supply Chain Management: An Exploratory Study, Aravindh Sekar
FAIDS: artificial intelligence developmental systems framework for predicting and preventing cyberattacks in supply chain networks, Lordt Becklines
Fine Grained Address Space Layout Randomization Using Noncontiguous Per-Function Memory Segment Assignment, Andrew Kramer
Flying through the air with the greatest of ease? Evaluation of glide capability in basal maniraptoran theropods, Norah Zoller, Kierra Miller, Michael B. Habib, Hans C. Larsson, and T. Alexander Deccechi
Functional analysis of differentially expressed genes in alfalfa (Medicago sativa) inoculated with Aphanomyces euteiches race 1 and race 2, Jay Alexander, Deborah A. Samac, and Andrew E. Sathoff
Generative AI for Synthetic Data Creation: Building Mastery-Focused Educational Datasets, Tapiwa Amion Chinodakufa and Khandaker Mamun Ahmed
How Technology Can Be Used to Reduce the Equity Gap in Healthcare for Underserved Communities, Richard Manprisio
Identification and Characterization of Pythium Species Isolated From Commercial Alfalfa Fields in South Dakota, Oleksandra Rachynska, Travis R. Rebstock, Conner L. Tordsen, Jennifer M. Giles, and Andrew E. Sathoff
If You Have Nothing to Hide, You Still Have Something to Fear: How Libraries Can Support Alternative Information Channels, Abbie Steuhm
Impact of Data Characteristics on the effectiveness of multi-stage transfer learning using MRI medical images, Ganga Prasad Basyal
Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code, Gary McCully, John Hastings, and Shengjie Xu
Impact of Organizational Changes on BI Critical Success Factors, Badr Harfoush
Improving Survey Methods to Better Detect Rare Grassland Birds in South Dakota, Kassy Hendricks, Kristel K. Bakker, and Chuck Dieter
In Defense of Artificial Intelligence, Darrin Dutcher
In Response to Your Recent Article: How Letters to the Editor Challenge Historical Narratives, Abbie Steuhm
Investigating the energetics and feeding ecology of a range of Azhdarchid Pterosaurs, Kierra Miller and T. Alexander Deccechi
Is Al-Driven threat detection an effective substitute for current threat detection architectures?, Connor J. Ford
Isolation and Characterization of Pythium spp. from South Dakota soils under commerical alfalfa production, Jennifer M. Giles and Andrew E. Sathoff
Machine Learning and SHAP Interpretability for Chronic Disease Understanding, Nnaemeka Charles Igwe
Malware Classification Using Weighted Control Flow Graphs, Tjada Nelson
Managing South Dakota Alfalfa Diseases with Commercial Biological Control Agents, Travis R. Rebstock, Conner L. Tordsen, Brandon Daniels, Oleksandra Rachynska, and Andrew E. Sathoff
Measuring the Effectiveness of AppLocker Against Banking Trojans (A Multi-year Study), Robert Riskin
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation, Sunil Arora and John Hastings
Mirage: A VBA Macro Emulator for Behavioral Analysis Powered by Machine Learning, Corey Mathew Hartman
Natural Bone Human Education Skeletons: Investigating Restoration and Ancestry, Emelye Josko
Natural Language Processing Applications in Medical Data, Sureh San and Mark Spanier
Natural Language Processing in Lakhota, Jackson Ruedebusch
Natural LanguageProcessing,UnderstandingSlang and ColloquialSpeech, Beau Miller
Navigating intent-based networking: from user descriptions to deployable configurations, Ala’ A. AlSamarneh, Ahmad T. Al-Hammouri, and Omar Y. Al-Jarrah
NIT: a Dataset for Network Intent Translation, Ala’ A. AlSamarneh, Omar Y. Al-Jarrah, and Ahmad T. Al-Hammouri
Open-Source Software Development: Mass Spectrometry Data Management Program Prototype, Sophia I. Lewis
Optimal Algorithm for Managing On-Campus Student Transportation, Youssef Harrath, Jood AlYusuf, Zeena Ghulam, and Muna AlDoseri
Performance Measurement of BGP Extended with De-Facto Network Identification, Shawn Zwach
Prescriptive Zero Trust: Assessing the Impact of Zero Trust on Cyber Attack Prevention, Samuel T. Aiello
Principles For the Design of Visual Progress Bars to Improve Motivation in Online Learning, Tania Shotts Williams
Pure Nash Equilibrium and Strong Nash Equilibrium Computation in Additive Aggregate Games, Jared Soundy, Mohammad T. Irfan, and Hau Chan
Quantifying Dynamic Response in Web Application Honeypots, Luke Constantino
Quantifying Return on Controls in LLM Cybersecurity, Richard Helder Moulton
Quantifying the Effectiveness of Dynamic Response in Web Application Honeypots, Luke Constantino
Quantitative Real-Time PCR Identification of Soybean Pathogens in Eastern South Dakota Soil, Brandon Daniels, Oleksandra Rachynska, Travis R. Rebstock, Conner L. Tordsen, and Andrew E. Sathoff
Research Aiming to Understand Baseline Cybersecurity Awareness for Senior Citizens and Their Training Needs, Malik A. Gladden
Research Poster, Ivan Casamalhuapa
RUFF: Resource Usage Fuzzing Framework, Gavin Black
Safeguarding Virtual Healthcare: A Novel Attacker-Centric Model for Data Security and Privacy, Suvineetha Herath, Haywood Gelman, John Hastings, and Yong Wang
Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs, Haywood Gelman and John Hastings
Science Fiction Media’s Influence on Public Perceptions of AI and Technology, Abbie Armstrong
Securing Modbus via Proxied Approach, Kyle Korman
Security through Neutrality? An analysis of net neutrality’s present position in cybersecurity, Jack Weekly
SETC: A Vulnerability Telemetry Collection Framework, Ryan Holeman, John Hastings, and Varghese Mathew Vaidyan
Setup and Design of GROWSTEM at DSU Year One Summary Report, Richard I. Avery, Tom Halverson, and Viki Johnson
Spatiotemporal Deep Learning for Land Cover and Impervious Surface Mapping with Satellite Imagery, Rylie Fleckenstein
Survey of IoT Users, Edward McGregor
SURVEY OF PRAIRIE LAKES FOR MICROPLASTICS IN EASTERN SOUTH DAKOTA, Vanessa Ocansey, Basbo Ayelazono, and Kristel K. Bakker
Switching Wearable Fitness Devices: Exploring Factors in Switching, Stephen Hendrix
Systematic Analysis of Factors Influencing Modulith Architecture Adoption over Microservices, Chandra Prakash and Sunil Arora
Terror from the Skies?: Investigating the energetics and feeding ecology of one of the largest pterosaurs: Quetzalcoatlus northropi, Kierra Miller and T. Alexander Deccechi
Testing Quantum Computers for Functioning Quantum Hardware, Matthew Lenarz
The Art of Campaigning: Joint Planners Working at the Intersections of Everything, Mary Bell, Edgar M. Hollandsworth, Thomas J. Snukis, Jeffrey Turner, Luke P. Bellocchi, Nicholas Anthony, Steve Tribble, Chris Botterbusch, and Justin D. Harper
The Effect of Compilation on the Identification of Obfuscated Malware, Eli T. Fulkerson
The Impact of Organizational Culture on Artificial Intelligence (AI) and Organizational Performance: A Mixed Methods Approach, Wlifred C. Mutale
The Language of Influence: Sentiment, Emotion, and Hate Speech in State Sponsored Influence Operations, Khandaker Mamun Ahmed and Ashfaq Ali Shafin
The Psychological Impacts of Algorithmic and AI-Driven Social Media on Teenagers: A Call to Action, Sunil Arora, Sahil Arora, and John Hastings
The Role of Privacy in the Intention to Disclose Personal Driving Data Using Internet-of-Vehicle Technology in Consumer Automobiles, Steven Bradley Fowler
The Well-Being of a University: The Relationship Between Gratitude and Organizational Commitment on Faculty Members' Intention to Stay, Brenda Merkel, Kristi Bockorny, Amber Henderson, and Aaron Scholl
Toward an Insider Threat Education Platform: A Theoretical Literature Review, Haywood Gelman, John D. Hastings, David Kenley, and Eleanor Loiacono
Toward extracting scattering phase shift from integrated correlation functions. III. Coupled channels, Peng Guo and Frank Lee
Transforming Information Systems Management: A Reference Model for Digital Engineering Integration, john bonar and John Hastings
Transforming Information Systems Management: A Reference Model for Digital Engineering Integration, John Bonar and John Hastings
Using LLMs to Establish Implicit User Sentiment of Software Desirability, Sherri Weitl-Harms, John D. Hastings, and Jonah Lum
Using LLMs to Synthesize Product Desirability Datasets, John Hastings, Sherri Weitl-Harms, Joseph Doty, Zachary J. Myers, and Warren Thompson
Utilizing Large Language Models to Synthesize Product Desirability Datasets, John D. Hastings, Sherri Weitl-Harms, Joseph Doty, Zachary L. Myers, and Warren Thompson
Video Games: Do They Affect Adolescent and Teen Behaviors?, Kyle L. Wormstadt